CVE-2006-0301 (CNNVD-200601-364)

HIGH
中文标题:
Xpdf "Splash.cc" Splash图形处理堆溢出漏洞
英文标题:
Heap-based buffer overflow in Splash.cc in xpdf, as used in other products such as (1) poppler, (2) ...
CVSS分数: 7.5
发布时间: 2006-01-30 22:00:00
漏洞类型: 授权问题
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v3
漏洞描述
中文描述:

Xpdf是便携文档格式(PDF)文件的开放源码浏览器。 Xpdf在处理畸形的splash图形文件时存在漏洞,攻击者可能利用此漏洞在用户机器上执行任意指令。Xpdf在处理畸形splash图形时,相关的"splash/Splash.cc"代码中存在堆溢出漏洞,可能导致生成超出相关位图的"width"或"height"的值。远程攻击者可以诱骗用户打开恶意的文档导致执行任意代码。

英文描述:

Heap-based buffer overflow in Splash.cc in xpdf, as used in other products such as (1) poppler, (2) kdegraphics, (3) gpdf, (4) pdfkit.framework, and others, allows attackers to cause a denial of service and possibly execute arbitrary code via crafted splash images that produce certain values that exceed the width or height of the associated bitmap.

CWE类型:
CWE-119
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
xpdf xpdf * - - cpe:2.3:a:xpdf:xpdf:*:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
18707 third-party-advisory
cve.org
访问
ADV-2006-0422 vdb-entry
cve.org
访问
1015576 vdb-entry
cve.org
访问
SCOSA-2006.15 vendor-advisory
cve.org
访问
18837 third-party-advisory
cve.org
访问
xpdf-splash-bo(24391) vdb-entry
cve.org
访问
18834 third-party-advisory
cve.org
访问
MDKSA-2006:031 vendor-advisory
cve.org
访问
18983 third-party-advisory
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
MDKSA-2006:030 vendor-advisory
cve.org
访问
20060202 [KDE Security Advisory] kpdf/xpdf heap based buffer overflow mailing-list
cve.org
访问
18864 third-party-advisory
cve.org
访问
ADV-2006-0389 vdb-entry
cve.org
访问
18677 third-party-advisory
cve.org
访问
GLSA-200602-12 vendor-advisory
cve.org
访问
FEDORA-2006-103 vendor-advisory
cve.org
访问
RHSA-2006:0201 vendor-advisory
cve.org
访问
MDKSA-2006:032 vendor-advisory
cve.org
访问
GLSA-200602-05 vendor-advisory
cve.org
访问
18882 third-party-advisory
cve.org
访问
18274 third-party-advisory
cve.org
访问
oval:org.mitre.oval:def:10850 vdb-entry
cve.org
访问
DSA-974 vendor-advisory
cve.org
访问
DSA-971 vendor-advisory
cve.org
访问
18825 third-party-advisory
cve.org
访问
RHSA-2006:0206 vendor-advisory
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
470 third-party-advisory
cve.org
访问
SSA:2006-045-09 vendor-advisory
cve.org
访问
18875 third-party-advisory
cve.org
访问
GLSA-200602-04 vendor-advisory
cve.org
访问
18860 third-party-advisory
cve.org
访问
18908 third-party-advisory
cve.org
访问
18839 third-party-advisory
cve.org
访问
USN-249-1 vendor-advisory
cve.org
访问
18862 third-party-advisory
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
SSA:2006-045-04 vendor-advisory
cve.org
访问
19377 third-party-advisory
cve.org
访问
FLSA:175404 vendor-advisory
cve.org
访问
DSA-972 vendor-advisory
cve.org
访问
18913 third-party-advisory
cve.org
访问
18838 third-party-advisory
cve.org
访问
18826 third-party-advisory
cve.org
访问
CVSS评分详情
7.5
HIGH
CVSS向量: AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS版本: 2.0
机密性
PARTIAL
完整性
PARTIAL
可用性
PARTIAL
时间信息
发布时间:
2006-01-30 22:00:00
修改时间:
2024-08-07 16:34:13
创建时间:
2025-11-11 15:32:31
更新时间:
2025-11-11 15:49:04
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2006-0301 2025-11-11 15:17:39 2025-11-11 07:32:31
NVD nvd_CVE-2006-0301 2025-11-11 14:51:47 2025-11-11 07:41:16
CNNVD cnnvd_CNNVD-200601-364 2025-11-11 15:08:50 2025-11-11 07:49:04
版本与语言
当前版本: v3
主要语言: EN
支持语言:
EN ZH
安全公告
暂无安全公告信息
变更历史
v3 CNNVD
2025-11-11 15:49:04
vulnerability_type: 未提取 → 授权问题; cnnvd_id: 未提取 → CNNVD-200601-364; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 授权问题
  • cnnvd_id: 未提取 -> CNNVD-200601-364
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:41:16
severity: SeverityLevel.MEDIUM → SeverityLevel.HIGH; cvss_score: 未提取 → 7.5; cvss_vector: NOT_EXTRACTED → AV:N/AC:L/Au:N/C:P/I:P/A:P; cvss_version: NOT_EXTRACTED → 2.0; affected_products_count: 0 → 1; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • severity: SeverityLevel.MEDIUM -> SeverityLevel.HIGH
  • cvss_score: 未提取 -> 7.5
  • cvss_vector: NOT_EXTRACTED -> AV:N/AC:L/Au:N/C:P/I:P/A:P
  • cvss_version: NOT_EXTRACTED -> 2.0
  • affected_products_count: 0 -> 1
  • data_sources: ['cve'] -> ['cve', 'nvd']